{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T01:55:33Z","timestamp":1743040533822,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031746260"},{"type":"electronic","value":"9783031746277"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-74627-7_38","type":"book-chapter","created":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T14:01:01Z","timestamp":1735653661000},"page":"459-468","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Tracing Videos to\u00a0Their Social Network with\u00a0Robust DCT Analysis"],"prefix":"10.1007","author":[{"given":"Ben","family":"Lewis","sequence":"first","affiliation":[]},{"given":"Victor","family":"Sanchez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,1]]},"reference":[{"key":"38_CR1","unstructured":"Ceci, L.: Hours of video uploaded to youtube every minute as of february 2022 (2022). https:\/\/www.statista.com\/statistics\/259477\/hours-of-video-uploaded-to-youtube-every-minute\/"},{"key":"38_CR2","doi-asserted-by":"crossref","unstructured":"Pasquini, C., Amerini, I., Boato, G.: Media forensics on social media platforms: a survey. EURASIP J. Inf. Secur. 2021, 4 (2021)","DOI":"10.1186\/s13635-021-00117-2"},{"key":"38_CR3","doi-asserted-by":"crossref","unstructured":"Giudice, O., Paratore, A., Moltisanti, M., Battiato, S.: A classification engine for image ballistics of social data. In: Image Analysis and Processing - ICIAP 2017, pp. 625\u2013636. Springer International Publishing (2017)","DOI":"10.1007\/978-3-319-68548-9_57"},{"key":"38_CR4","doi-asserted-by":"crossref","unstructured":"Caldelli, R., Amerini, I., Li, C.T.: Prnu-based image classification of origin social network with CNN. In: 2018 26th European Signal Processing Conference (EUSIPCO), pp. 1357\u20131361 (2018)","DOI":"10.23919\/EUSIPCO.2018.8553160"},{"key":"38_CR5","doi-asserted-by":"crossref","unstructured":"He, J., Lin, Z., Wang, L., Tang, X.: Detecting doctored jpeg images via dct coefficient analysis. In: Leonardis, A., Bischof, H., Pinz, A., eds, Computer Vision \u2013 ECCV 2006, pp. 423\u2013435, Berlin, Heidelberg, Springer Berlin Heidelberg (2006)","DOI":"10.1007\/11744078_33"},{"key":"38_CR6","doi-asserted-by":"crossref","unstructured":"Amerini, I., Uricchio, T., Caldelli, R.: tracing images back to their social network of origin: a CNN-based approach. In: 2017 IEEE Workshop on Information Forensics and Security (WIFS), pp. 1\u20136 (2017)","DOI":"10.1109\/WIFS.2017.8267660"},{"issue":"5","key":"38_CR7","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1109\/JSTSP.2020.3008088","volume":"14","author":"P Yang","year":"2020","unstructured":"Yang, P., et al.: Efficient video integrity analysis through container characterization. IEEE J. Sel. Top. Signal Proce. 14(5), 947\u2013954 (2020)","journal-title":"IEEE J. Sel. Top. Signal Proce."},{"key":"38_CR8","doi-asserted-by":"crossref","unstructured":"Altinisik, E., Sencar, H.T., Tabaa, D.: Video source characterization using encoding and encapsulation characteristics. IEEE Trans. Inf. Forensics Secur. 17, 3211\u20133224 (2022)","DOI":"10.1109\/TIFS.2022.3204210"},{"key":"38_CR9","doi-asserted-by":"publisher","first-page":"1112","DOI":"10.1109\/LSP.2022.3167631","volume":"29","author":"D Shullani","year":"2022","unstructured":"Shullani, D., Baracchi, D., Iuliani, M., Piva, A.: Social network identification of laundered videos based on DCT coefficient analysis. IEEE Signal Proce. Lett. 29, 1112\u20131116 (2022)","journal-title":"IEEE Signal Proce. Lett."},{"key":"38_CR10","doi-asserted-by":"publisher","first-page":"35264","DOI":"10.1109\/ACCESS.2019.2903876","volume":"7","author":"I Amerini","year":"2019","unstructured":"Amerini, I., Li, C.-T., Caldelli, R.: Social network identification through image classification with CNN. IEEE Access 7, 35264\u201335273 (2019)","journal-title":"IEEE Access"},{"key":"38_CR11","doi-asserted-by":"crossref","unstructured":"Amerini, I., Anagnostopoulos, A., Maiano, L., Celsi, L.R.: Learning double-compression video fingerprints left from social-media platforms. In: ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2530\u20132534 (2021)","DOI":"10.1109\/ICASSP39728.2021.9413366"},{"key":"38_CR12","doi-asserted-by":"crossref","unstructured":"Maiano, L., Amerini, I., Ricciardi Celsi, L., Anagnostopoulos, A.: Identification of social-media platform of videos through the use of shared features. J. Imaging 7(8), 140 (2021)","DOI":"10.3390\/jimaging7080140"},{"issue":"10","key":"38_CR13","first-page":"2017","volume":"15","author":"D Shullani","year":"2017","unstructured":"Shullani, D., Fontani, M., Iuliani, M., Alshaya, O., Piva, A.: Vision: a video and image dataset for source identification. EURASIP J. Inf. Secur. 15(10), 2017 (2017)","journal-title":"EURASIP J. Inf. Secur."},{"key":"38_CR14","doi-asserted-by":"publisher","first-page":"76937","DOI":"10.1109\/ACCESS.2019.2922145","volume":"7","author":"BC Hosler","year":"2019","unstructured":"Hosler, B.C., Zhao, X., Mayer, O., Chen, C., Shackleford, J.A., Stamm, M.C.: The video authentication and camera identification database: a new database for video forensics. IEEE Access 7, 76937\u201376948 (2019)","journal-title":"IEEE Access"},{"key":"38_CR15","unstructured":"Video Quality Experts Group. Modified jm h.264\/avc codec. https:\/\/vqeg.github.io\/software-tools\/encoding\/modified-avc-codec\/ Accessed 26 Mar 2023"},{"issue":"3","key":"38_CR16","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868\u2013882 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Communications in Computer and Information Science","Machine Learning and Principles and Practice of Knowledge Discovery in Databases"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-74627-7_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T14:16:08Z","timestamp":1735654568000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-74627-7_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031746260","9783031746277"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-74627-7_38","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"1 January 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECML PKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Joint European Conference on Machine Learning and Knowledge Discovery in Databases","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Turin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecml2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2023.ecmlpkdd.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}